CarolinaCon 11\nThe Last CarolinaCon As We Know It\n

More info coming soon.

\n\n

CarolinaCon is an annual conference in North Carolina that is ded
icated to sharing knowledge about technology\, security and information ri
ghts. CarolinaCon also serves to enhance the local and international aware
ness of current technology related issues and developments. CarolinaCon al
so strives to mix in enough entertainment and side contests/challenges to
make for a truly fun event.

\n

CarolinaCon was started in 2005 and ha
s been held every year since. With each passing year the conference contin
ues to grow and attract more attendees and speakers. As has always been th
e case\, CarolinaCon is put together and run by an all-volunteer staff. Ca
rolinaCon is proudly brought to you by “The CarolinaCon Group”. The Caroli
naCon Group is a non-profit organization registered in the state of NC\, d
edicated to educating the local and global communities about technology\,
information/network/computer security\, and information rights.

\n

Th
e CarolinaCon Group is also closely associated with various 2600 chapters
across NC\, SC\, TN\, VA\, LA\, DC\, GA\, PA and NY. Many of the volunteer
s who help develop and deliver CarolinaCon come from those chapters.

InfoSec World
2015

\n

The MISTI team is excited to bring you a lineup of conference se
ssions\, workshops and summits that address the most pressing matters in i
nformation security today. With a selection of our top-rated returning spe
akers and a roster of highly-regarded new-to-InfoSec World speakers\, we a
re certain you will find content that is compelling\, actionable and appli
cable to the current challenges you face at your job. Join us in Orlando
span> and experience our enhanced netwo
rking opportunities and themed receptions filled with interactive activiti
es. We look forward to welcoming
you at InfoSec World at Disney in March!

Black Hat Asia 2015

\n

Black Hat is returning to Asia again in 2015\
, and we have quite an event in store. Here the brightest professionals an
d researchers in the industry will come together for a total of four days–
two days of deeply technical hands-on Trainings\, followed by two days of
the latest research and vulnerability disclosures at our Briefings.

\n<
h2>Briefings\n

The Black Hat Briefi
ngs have become the most important security conference series in the w
orld by sticking to our core value: serving the information security commu
nity by delivering timely\, actionable security information in a friendly\
, vendor-neutral environment.

\n

Trainings

\n

Black Hat Asia 2
015 is set to bring together the best minds in security to define tomorrow
’s information security landscape in Singapore. This year’s Training courses offer the essential knowledge and sk
ills to defend your enterprise against today’s threats.

\n

Business
Hall

\n

Featuring top international solution providers showcasing th
e latest tools\, technologies and services supporting the security communi
ty. The 2015 Black Hat Asi
a Business Hall brings more opportunities for attendee\, vendor and co
mmunity engagement\, including an expanded Show Floor\, Vendor Sessions an
d a sleek Networking Lounge.

RSA Conference 20
15 – USA

\n

Same time\, same place\, same humongous crowds! RSA Conf
erence 2015 is not specifically focused on hacking\, pentesting and the li
ke\, but it is the largest general information security event and has been
for years.

Innovation Sandbox Con
test

Check out our Gallery of Victors and see which ones were acquired by Cisco and Juniper\, which had success
ful IPOs\, and how all received funding within a year of winning. Is your
company next? Ready to compete? Submissions open January 12\, 2015.

\n<
h2>The Sandbox\n

In this collaborative space\, you will have the op
portunity to engage in dynamic learning and networking opportunities. Kick
ing off the week with the popular RSAC Innovation Sandbox Contest\, The RS
AC Sandbox at Moscone Center North\, Room 134 continues through Thursday\,
hosting a suite of hands-on activities. Bring your forward-thinking ideas
to share with your peers and enrich your RSA Conference experience!

\n

The Viewing Point at Gateway

\n

\n

The Viewing
Point was introduced at RSA® Conference 2014 in direct response to the ne
eds of our attendees. We heard loud and clear that attending professionals
wanted to consume information and content at their own pace and in ways t
hat better suited their busy schedules and learning styles. So we built Th
e Viewing Point. By all accounts\, this space had a real impact on the Con
ference experience\, which is why it will continue to be part of RSA Confe
rence 2015.

\n

The Viewing Point has a lounge-style atmosphere that’s
comfortable and easily accessible. And provides our attendees an alternat
ive and casual way to watch and experience the keynotes and other programs
. Food and coffee along with comfortable seating\, Wi-Fi access\, power fo
r mobile devices\, and live Twitter boards are all available in this space
. During the opening keynotes on Tuesday\, April 21\, we may even have som
e special guests making an appearance—be sure to stop by and check it out.

\n\n

\n

\n

About RSA Conference

\n

\n

RSA Conference is helping drive the information security agen
da worldwide with annual industry events in the U.S.\, Europe and Asia. T
hroughout its history\, RSA Conference has consistently attracted the worl
d’s best and brightest in the field\, creating opportunities for conferenc
e attendees to learn about IT security’s most important issues through fir
st-hand interactions with peers\, luminaries and emerging and established
companies. As the IT security field continues to grow in importance and i
nfluence\, RSA Conference plays an integral role in keeping security profe
ssionals across the globe connected and educated.

\n

RSA developed RS
A Conference in 1991 as a forum for cryptographers to gather and share the
latest knowledge and advancements in the area of Internet security. Toda
y\, RSA Conference and related RSA Conference branded activities are still
managed by RSA\, with the support of the industry. RSA Conference event
programming is judged and developed by information security practitioners
and other related professionals.

THOTCON 0x6

\n

THOTCON (pronounced \\ˈthȯt\\ and
taken from THree – One – Two) is a small venue hacking conference based i
n Chicago IL\, USA. This is a non-profit\, non-commercial event looking to
provide the best conference possible on a very limited budget.

\n

On
ce you attend a THOTCON event\, you will have experienced one of the best
information security conference experiences combined with a uniquely casua
l and social experience.

\n

THOTCON 0x6 is the sixth incarnation of t
his event and will be held on Thursday and Friday May 14-15\, 2015.

\n<
p>It will be held at a location only to be disclosed to attendees and spea
kers during the week before the event.\n

– It will be held in the cit
y of Chicago.\n– It will be held at a bar-like venue (drink from 8:3
0am to close if you please).\n– It will be within walking distance f
rom a CTA Brown Line stop.\n– There will be food & drink for purchas
e all day.\n– Purchases will be CASH ONLY\, so plan ahead.\n>
There are plenty of ATMs in the area.

BSides Chicago 2015

\n

Each BSides is a co
mmunity-driven framework for building events for and by information securi
ty community members. The goal is to expand the spectrum of conversation b
eyond the traditional confines of space and time. It creates opportunities
for individuals to both present and participate in an intimate atmosphere
that encourages collaboration. It is an intense event with discussions\,
demos\, and interaction from participants. It is where conversations for t
he next-big-thing are happening.

\n

\n

Who is Speaking at BSi
des Chicago 2015?

\n

You. Your Friends. Your Coworkers. And that ran
dom guy who no one remembers his name but remembers he can code like a mac
hine. CFP will open soon.

CEIC 2
015

\n

\n

It’s no exaggeration to say that CEIC (Computer and En
terprise Investigations Conference) is the biggest digital-investigations
conference of its kind and the only one to offer hands-on lab sessions and
training for practical skills development. From sessions on acquiring evi
dence from mobile devices to international e-discovery to cyber security i
ntelligence\, there’s simply no other training or seminar series available
that packs so much relevant and practical information from so many expert
speakers into a four-day period.

It’s a cybersecurity conference<
/strong> where incident responders and information security specialists me
et up with their fellow experts from around the world to network and learn
the very latest security tactics.

\n

\n

\n

It’s a
legal technology conference where inside counsel and liti
gation support staff learn how to collaborate with information security pr
ofessionals prior to litigation.

\n

\n

\n

It’s a digital forensics conference where everyone from beginning
forensic investigators to the best of the best learn different and better
methods that take their professional capabilities to a whole new level.

App Central Wor
ld at CEIC 2015

\n

No CEIC experience is complete until you check ou
t EnCase App Central World. Staffed by Guidance Software experts as well a
s community experts who develop the apps that are available online\, EnCas
e App Central World is the place for getting a good look at the latest pro
ducts\, apps\, EnScripts\, and templates that improve your investigative w
orkflow so you can close more cases faster.

\n

Stop by EnCase App
Central World at CEIC to:

\n

\n

Learn about the diverse ecosy
stem of dozens of products that either extend\, integrate\, or work seamle
ssly with EnCase\, such as Internet Evidence Finder (IEF)\, a Volatility R
eporting Plug-in\, and useful extensions such as a VSS Examiner

Talk with EnCase Technology Partners as they showca
se their solutions.

\n

\n

Training at CEIC 2015

\n

The En
CE and EnCEP exam will be offered on Monday\, May 18 through Wednesday\, M
ay 20 from 8am – 3pm each day. An application is required to take the exam
\, but you are not required to register for a specific exam time. Once you
r application is accepted\, you will receive testing instructions and logi
n information.

OWASP AppSecEU 20
15

\n

The BeNeLux chapters will host the OWASP AppSec Europe Researc
h 2015 global conference in Amsterdam\, The Netherlands from May 19-22. Am
sterdam is the capital of the Netherlandsandth
e largest cityof the country.

\n

The AppSec Europe 2015 conference will be a premier gathering of Info
rmation Security leaders\, also it is going to have a research part.

\n

Executives from Fortune 500 firms along with technical thought leaders
such as security architects and lead developers will be traveling to hear
the cutting-edge ideas presented by Information Security’s top talent. OWA
SP events attract a worldwide audience interested in “what’s next”. The co
nference is expected to draw 400-500 technologists from Government\, Finan
cial Services\, Media\, Pharmaceuticals\, Healthcare\, Technology and many
other verticals.

\n

The conference program will consist of five trac
ks (Developers\, Ops\, Hack\, CISO and Research). The full conference sche
dule will be available mid-February\, with a range of interesting and prov
oking keynote spe
akers to open and close each day of the conference presentations\, but
also a lot of satellite events.

\n\n

Events at OWASP AppSecEU
2015

\n\n

\n

Different satellite
events will take place during the AppSec Europe conference.

ShowMeCon 2015

\n

St. Louis’ Hacking & Cyber Security Con

\n

ShowMeCon. The
name says it all. Known as the Show Me State\, Missouri is home to St. Lo
uis-based ethical hacking firm\, Parameter Security\, and security training compan
y\, Hacker University. Toget
her\, they are bringing you a one-of-a-kind event that will Show You the S
tate of security from a unique perspective – the hacker’s viewpoint.

\n

This highly technical forum showcases eye-opening presentations from wo
rld-renown ethical hackers and epic security ninjas which will leave you a
mazed and frightened at the same time. By giving you access into the mind
of a hacker\, you will better understand how to protect your networks and
critical data. As we always say “In order to beat a hacker\, you have to t
hink like one” and “if you don’t understand the enemy\, how can you protec
t against him?” ShowMeCon pulls back the curtain and exposes how hackers a
re winning the war on physical and cyber security.

\n

In addition to
witnessing real-world hacks\, experts will tackle a variety of specialized
topics\, such as hacking mobile devices\, cloud computing\, leveraging mo
bile devices in pen tests\, cryptanalysis\, how the most protected systems
can be breached\, defending your systems\, computer forensics and more. D
iscover the latest vulnerabilities\, the most powerful exploits and curren
t security threats at this cutting-edge\, two day con. Plus\, partake in o
ur “capture the flag” event and take your best shot at hacking into variou
s environments.

\n

Whether you’re a large corporation or a small busi
ness\, you should attend this mind-blowing event as you witness the cream
of the crop unveil the latest attacks\, techniques\, tactics and practices
of today’s hackers. Plus\, gain insight and understanding into ways to ef
fectively protect yourself so you can implement this information immediate
ly when you return to your business.

Hak4Kidz 2015

\n

Hak4Kidz is the first official youth based ethical hacking conference in C
hicago that is *not* a hackathon.

\n

Hak4Kidz is an eve
nt by ethical hackers and Information Security professionals dedicated to
bring the educational and communal benefits of whitehat hacking conference
s to children and young adults. We plan to accomplish this mission by putt
ing our collective expertise and passion on display for the attendees to i
nteract with us at their will. A combination of youth base speaking tracks
complementing an open area of stations will enable the attendees to expan
d and enlighten their technical interests. For innovation to perpetuate\,
it’s imperative that today’s young users are exposed to the bigger picture
of how we got here and to help realize their potential.

\n

Activiti
es at Hak4Kidz 2015

\n

Additional activities for Hak4Kidz are still
being finalized\, so please check back regularly. In the meantime\, these
are the activities from last year:

\n

Time to get your hak on with th
ese educational activities from 2014:

\n

\n

jrCTF – junior Capture The Flag contest for prizes

\n

Snap Circ
uits – Award winning engineering toy by Elenco

\n

Networking Playground – Hooking up network gear and securing them

\n

Homemade Hacks – Old tech meets new tech for a
lternative tech! And a programmable robot!!

SteelCon 2015

\n<
h1>The North’s Premier Hacker* Con!\n

With a growing international
interest in security events and hacker conferences\, and the increasing fo
cus on security in the media\, SteelCon offers a unique opportunity for yo
u to get involved and develop your hacking* skills.

\n

After last yea
rs very successful event we will be back in 2015\, bigger and better. Capa
city will be doubled\, there will be more activities and hopefully a lot m
ore fun.

\n

It doesn’t matter what your background is\, whether you’r
e a security professional or penetration tester by trade or a hobbyist who
’s just picked up your first Raspberry Pi. This is a conference with somet
hing for everyone in a family friendly environment\, with activities for b
ig kids and little kids so come along and join in.

\n

The
Events Team

\n

*hacker: n. someone with an interes
t in how things work\, how things can be broken and how they can be fixed.

RSA Conference Asia Pacific & Japan 2015

\n

RSA Conferenc
e Asia Pacific & Japan is the leading information security event in the re
gion. Join us for three days of engaging sessions and intense networking.
Get exposure to innovative technologies and leadership that will help secu
re your organization and your future.

\n

RSA Conference Asia Pacific
& Japan 2015 will take place at the Marina Bay Sands in Singapore 22 to 24
July.

*A discount code will be emailed to you when Early Bi
rd Registration opens. Only one discount code can be used per registration
. Discount offers cannot be combined.

\n\n

About RSA Conf
erence

\n

\n

RSA Conference is helping drive the i
nformation security agenda worldwide with annual industry events in the U.
S.\, Europe and Asia. Throughout its history\, RSA Conference has consist
ently attracted the world’s best and brightest in the field\, creating opp
ortunities for conference attendees to learn about IT security’s most impo
rtant issues through first-hand interactions with peers\, luminaries and e
merging and established companies. As the IT security field continues to
grow in importance and influence\, RSA Conference plays an integral role i
n keeping security professionals across the globe connected and educated.<
/p>\n

RSA developed RSA Conference in 1991 as a forum for cryptographers
to gather and share the latest knowledge and advancements in the area of
Internet security. Today\, RSA Conference and related RSA Conference bran
ded activities are still managed by RSA\, with the support of the industry
. RSA Conference event programming is judged and developed by information
security practitioners and other related professionals.